Описание
In the read() function of ProcessStats.java, there is a possible read/write serialization issue leading to a permissions bypass. This could lead to local escalation of privilege where an app can start an activity with system privileges with no additional execution privileges needed. User interaction is not needed for exploitation.
Ссылки
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*
cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*
cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*
EPSS
Процентиль: 0%
0.00006
Низкий
6.7 Medium
CVSS3
7.8 High
CVSS3
Дефекты
NVD-CWE-noinfo
CWE-276
Связанные уязвимости
CVSS3: 7.8
github
около 1 года назад
In the read() function of ProcessStats.java, there is a possible read/write serialization issue leading to a permissions bypass. This could lead to local escalation of privilege where an app can start an activity with system privileges with no additional execution privileges needed. User interaction is not needed for exploitation.
EPSS
Процентиль: 0%
0.00006
Низкий
6.7 Medium
CVSS3
7.8 High
CVSS3
Дефекты
NVD-CWE-noinfo
CWE-276